SlideShare une entreprise Scribd logo
1  sur  18
Stages of Information System development 1) Requirement analysis : study the existing system & determine the requirements of User preparation of system study report. 2) Systems Design (Logical Design) : Conceptualization of the new system based on system study report prepared in step 1. It deals with algorithm, database design , specification of interfaces between all programs to make a system, hardware, Operating system, file system & programming languages.. 3) Development of  prototype : With a concept, design a model 4) System Design (Physical Design) : Partitioning of the system in to programs, preparing a detail algorithm to the problem confronted  with a detail database design, interfaces used, OS, H/w, S/w, file system and languages. 5) Preparation of test data – About each individual stages & programs as well as system linking testing.
Approaches to algoithms Hardware  - single / Multiple user environment. Data storage & retrieval – Magnetic tape, Hard disk, CD, DVD Input devices – Punched card reader, keyboard, digitizer, Mouse, Mike, Scanners. Output devices – Printers (laser, dot matrix, Ink jet), monitor. Operating system – default to the user environment (DOS, Windows, Unix, Xenix) Language – Basic, Fortran, C, C++, DHTML, ASP. Net, etc.	 Productivity tool – Program generators and application generator tools. Data Management  - Conventional File system (Sequential) and Database Management System, RDBMS.  hbs.ac.in
Development of System Software S/w Development Trend Scheduled Operation Single Transaction Process Batch Sequential process On-demand operation Batch Indexed Sequential process Batch Random process Interactive Non-interactive Slow Response Fast Response Response in 24 hours Data read & updated interactively Data read &  not updated interactively Response as soon as possible hbs.ac.in
Expert systems (ES)  It is a computer programs which make recommendations and draw conclusions from rules of thumb / heuristics and from the relationships derived out of human behaviour. It aids the manager in the process of decision-making by suggesting alternatives solutions in all desciplines. It provides expert advice by “domain specific knowledge”. Processing information requires knowledge , comprising judgement, experience, and reasoning of top management. A right decision can be made at the time – only when right information is available to the right man, in the right form, at the right time. The decision maker analyze, evaluate and reason with this knowledge along assistantship of specialized knowledge in an appropriate way. An effective decision has two components, Timeliness and Correctness i.e., quality and consistency in DM.  hbs.ac.in
Expert systems (ES) Outcomes Major activities like expansion, investment planning, raising fresh capital on a venture, make or buy analysis and dividend decisions by considering current economic conditions. Other decision like setting up or shutting down of a production unit/ line against the alternative of purchasing the item.  ES will give you an estimation of various costs involved and its association with each alternatives. It also draws control, design, monitor, predict and train middle level management for performance enhancer. Establishing control systems, budgeting, cash flow analysis, framing customer credit policies, forecasting income, expenses  growth rates, accounts payable & receivable. Diagnosis, interpretation & monitoring of all the activities at the lower levels  and application is virtually endless. hbs.ac.in
Expert systems Applications Establishing sales quotas. Conducting trainee orientation. Recommending acquisition strategies. General project proposals. Job shop scheduling. Facilities  maintenance. Selection of forecasting models Determining credit limits, and Selecting transport routes. hbs.ac.in
Basis of Data Communication (DC) 	By data communication we mean the transportation of information from one point to another through a communication media.       It facilities efficient use of large computers, improves the day-to-day monitoring of projects and provides a variety of services like e-mail, credit card checking, etc are valued added services.  	The main components of DC are data source (originator), data sink (receiver), and communication media (telephone wire, co-axial cable, microwave, fibre-optic, satellite circuit). hbs.ac.in
Types of Data Communication (DC) Electronic signals actually represents reality viz., pressure, temperature, stress that can be represented in equivalent electronic signals. Analog and Digital are the two types of e-signal. Analog signals are continuous in nature in a sinusoidal form, there is no break anywhere. E.g. speech in a microphone. Digital signals are discrete in nature i.e., present TRUE or not present FALSE. Computers uses only digital signals for data communication. MOdulator-DEModulator (MODEM) is a device that converts Analog to Digital and vice versa. hbs.ac.in
Types of Transmission  Transmission of data in either digital / analog form since signals may originate from several independent sources e.g. computers, FAX, Video conference, etc. (Baud, Bit, Byte, Nibble)  Analog transmission  is similar like transmission through telephone network, they travel a longer distance and has noise interferences (electrical parlance) in it, that can damage the content & integrity of data at large. Digital transmission is less error prone, high quality, digital fidelity, and can’t travel long distance hence converted to electrical analog signal before transmission. They are not simply amplified, they are absorbed & regenerated at regular intervals, thus noise are eliminated. hbs.ac.in
Mode of Data Transmission  Serial mode – a stream of data bit by bit over the communication line. Initially a sender transmits the first bit, after some time (machine cycle) the second bit is transmitted and so on. The receiver receives the data exactly in the same format sequence bit by bit. The objective is to transmit data from one point to another along a single line or channel. The channel has an ability to carry a signal at a time (LSB, MSB). Receiver consequently has an ability to recognize the serial stream of bits as character. There are two techniques for recognizing and separating characters from the serial bit stream. They are synchronous and asynchronous transmission. During transmission if any error occurred, that particular bit is only lost and it operates on cost effective hardware. Transmission of 8-bit ASCII data requires 8 cycles of operation. Serial data transmission is done in three ways, viz. synchronous, asynchronous and Iso-syndronous. hbs.ac.in
Mode of Data Transmission  Parallel mode – Here all the bits of information are transmitted in a single cycle.  i) During transmission if any error occurred, whole set of data is lost and it operates on costly hardware. E.g. 8-bit ASCII code, all the 8 bits are transmitted over the communication media in a single cycle (i.e.,) eight-fold increase in the transmission speed.  ii) Limitations are the sender and receiver have to agree on the exchange of one or more characters using appropriate protocol (communication control methodology) – defines the content and the sequence of exchange of units of information (bits, bytes, or groups of bytes called PACKETS) b/w any two systems. iii) At high speeds of transfer using parallel transmission, protocols will be in the form of hardware signal exchanges (complex and expensive). Always used b/w subsystems of a computer system. iv) They are confined to shorter distance transmission (few feet). hbs.ac.in
Serial Mode of Data Transmission  Asynchronous Transmission – It is most commonly used transmission mode, where each character data to be transmitted is preceded by a start bit and terminated by one or two stop bits. It is also called as START/STOP transmission with indefinite time lag for the next character. i) The start signal tells the receiver where the new character starts and the function of stop bit is to tell the receiver that the character has ended, so that the next start bit will be perceived as the start of a new character. The receiver can know the end of the character by counting the number of bits. e.g person keying from a keyboard and getting the response from monitor. ii) Always , the two devices (terminal & computer), have to agree upon the number of bits in a character and the bit time.  iii) The speed ranges from 1200 bits per second to 9600 bits per  second and applied b/w different devices of varying speed, e.g a Computer terminal with a dot matrix printer . iv) It is relatively simple to implement but its results are inefficient  since it lack full utilization of channel capacity. hbs.ac.in
Serial Mode of Data Transmission  b) Synchronous Transmission – It is used to achieve high speed of data-transmission, where sender transmit a block of characters together in one single transmission.  The transmission b/w them is achieved by transmission of a pre-determined group of bits known as synchronous bits. These synchronous bits inform the receiver that the data is following and he can determine the time frame b/w each of the bits. The receiver start receiving the bits and starts interpreting them bit by bit of 8 bits, into character from as per ASCII code and transmits to the computer. There are at least three SYN characters, followed by number of  data characters and then finally the checksum character.  This type of transmission are done b/w device of same speed of operation. E.g. mother board RAM with cache memory. Discuss the difference b/w SYN and ASYN mode. hbs.ac.in
Serial Mode of Data Transmission     c) ISO-Synchronous Transmission – It is a technique which makes use of both synchronous and asynchronous data transmission modes.  i) Here each character starts with a start-bit and ends with a stop-bit. In addition, the time interval b/w transmission of two characters will be integer multiple of the length of the time required to transmit one character. (definite time lag). ii) A circuit is a path for transmission of electrical signals b/w two or more points. The termschannel, line, circuit, link or a path are synonymously used. 	iii) There are three types of transmission, viz. Simplex, half-duplex and full-duplex. Source Source Sink Sink Source Sink hbs.ac.in
Data Communication Software They are written in Assembly level language (hexadecimal or octal) and burnt into the microprocessor’s memory (ROM, EPROM).		 Main functions of these software were :	 a) Transmission initiation and termination 	b) Establishment of logical connections over physical line	 	c) Message assembly and deassembly 	d) data transmission and receipt 	e) code conversion 	f) error detection 	g) control character recognition. 	h) data editing i) data delivery 	j) data output 	k) transmission monitoring and maintenance 	l) Schedule and monitor all resources (H/w, S/W, data, etc). hbs.ac.in
Data Communication Protocols 	Primary Functions are         a) At the lowest level, h/w protocols, like ASYN transmission protocol that operate b/w two synchronized devices. 	b) To make sure that the bits are securely transmitted through the channel or line, we need a link protocol b/w two computers.	 Other functions are  1) Ensuring that the data to be transmitted is split into data blocks  with beginning and ending markers, called FRAMING and transmission block is called FRAME 	2) Achieving data transparency by allowing a link to treat a bit pattern, including normally restricted control characters. 	3) Controlling the flow of data across the link at a faster rate and ensure overflow, underflow, ensuring buffering capacity used-up that leads to loss of data. 	4) Controlling errors by detection using some redundancy check 	5) BISYNC (Binary Synchrounousprocools) and HLDC (high level data link control protocol , TCP/IP) hbs.ac.in
Seven layers of Open System International (OSI) Model 	Each of these layers performs certain specific functions 1) Physical layer - It is the lower layer that support wide variety of physical media for interconnection by using suitable  control procedures. 	2) Data link layer – It provides methods for error-free transmission over the physical layer and above s.no.1. 	3) Network layer – It performs the delivery of data through certain protocols such as routing and provides a communication path b/w two end-points. 	4) Transport layer – It forms the uppermost layer of data transport service. It isolates high level entities from any concern of transport of data  from one system to another & make transparent n/w to the users. 	5) Session layer – It performs the job of the controller and synchronizes the dialogue session between the systems. 	6) Presentation layer – It provides a general service not unique to a specific  application (AL) & concerns with representation and manipulation of data. 	7) Application Layer – It makes use of the service provided by the lower layers by providing interface to the user processes. hbs.ac.in
Data Transmission Error and Recovery Data while transmitted, may suffer some damage due to noise or distortion due to external disturbances or transmission medium itself. Please note 0 & 1 is send and received as 1 and 0, the given bit is either 0% error or 100%  and nothing in between. Bit Error Rate (BRR) of the channel decides about the characters send per second is counted, where both serial and parallel mode (Block Error Rates) of transmission are tested. Since the channels are error prone, recovery mechanisms are a must. Even a single bit is lost, the whole character consisting of weight bits is lost. Protocol (set of rules governing info. flow in a communication system) decides who can talk and when, start-stop protocol helps in restricting  loss to a character. Protocol has main purposes :  To ensure that the information is transmitted when and only when the communication channel is free and the appropriate terminal devices are read to receive  To prevent corruption or loss of information during transmission.       The receiving terminal can then send a character to indicate wither that the block was error free or that an error occurred and a retransmission is required with an ACK signal and NAK signal. hbs.ac.in

Contenu connexe

Tendances

Inter-Process Communication in distributed systems
Inter-Process Communication in distributed systemsInter-Process Communication in distributed systems
Inter-Process Communication in distributed systemsAya Mahmoud
 
Glossary of introduction to networks
Glossary of introduction to networksGlossary of introduction to networks
Glossary of introduction to networksevelyn
 
An Even Data-Distribution Protocolfor Highly Dynamic VANET
An Even Data-Distribution Protocolfor Highly Dynamic VANETAn Even Data-Distribution Protocolfor Highly Dynamic VANET
An Even Data-Distribution Protocolfor Highly Dynamic VANETIOSRJECE
 
16.Distributed System Structure
16.Distributed System Structure16.Distributed System Structure
16.Distributed System StructureSenthil Kanth
 
Communication primitives
Communication primitivesCommunication primitives
Communication primitivesStudent
 
Raju ahmed-1915002538-data-communication
Raju ahmed-1915002538-data-communicationRaju ahmed-1915002538-data-communication
Raju ahmed-1915002538-data-communicationRaju Ahmed
 

Tendances (11)

Computer network answer
Computer network answerComputer network answer
Computer network answer
 
Computer network introduction
Computer network introductionComputer network introduction
Computer network introduction
 
Inter-Process Communication in distributed systems
Inter-Process Communication in distributed systemsInter-Process Communication in distributed systems
Inter-Process Communication in distributed systems
 
Glossary of introduction to networks
Glossary of introduction to networksGlossary of introduction to networks
Glossary of introduction to networks
 
An Even Data-Distribution Protocolfor Highly Dynamic VANET
An Even Data-Distribution Protocolfor Highly Dynamic VANETAn Even Data-Distribution Protocolfor Highly Dynamic VANET
An Even Data-Distribution Protocolfor Highly Dynamic VANET
 
16.Distributed System Structure
16.Distributed System Structure16.Distributed System Structure
16.Distributed System Structure
 
Hf3612861290
Hf3612861290Hf3612861290
Hf3612861290
 
Communication primitives
Communication primitivesCommunication primitives
Communication primitives
 
Notes on Class 3
Notes on Class 3Notes on Class 3
Notes on Class 3
 
OSCh15
OSCh15OSCh15
OSCh15
 
Raju ahmed-1915002538-data-communication
Raju ahmed-1915002538-data-communicationRaju ahmed-1915002538-data-communication
Raju ahmed-1915002538-data-communication
 

En vedette

NAIROBI- KENYA-September 21,2013
NAIROBI- KENYA-September 21,2013NAIROBI- KENYA-September 21,2013
NAIROBI- KENYA-September 21,2013vinhbinh2010
 
Theme 4 part 2
Theme 4 part 2Theme 4 part 2
Theme 4 part 2tysenq
 
Russian 9-11 Memorial
Russian 9-11 MemorialRussian 9-11 Memorial
Russian 9-11 Memoriallocalshops
 
Roaring 20s full
Roaring 20s fullRoaring 20s full
Roaring 20s fullmikedunton
 
Chapter 5 power point
Chapter 5 power pointChapter 5 power point
Chapter 5 power pointclperki2
 
USA- Boston Marathon bombing - April 15,2013
USA- Boston Marathon bombing - April 15,2013USA- Boston Marathon bombing - April 15,2013
USA- Boston Marathon bombing - April 15,2013vinhbinh2010
 
Lesson 4 data processing
Lesson 4   data processingLesson 4   data processing
Lesson 4 data processingguevarra_2000
 
Computing Without Computers - Oct08
Computing Without Computers - Oct08Computing Without Computers - Oct08
Computing Without Computers - Oct08Ian Page
 
History.text.pearson
History.text.pearsonHistory.text.pearson
History.text.pearsonsidharth7
 
The English in North America
The English in North AmericaThe English in North America
The English in North AmericaAlex
 
Liberating lives: Invisible Australians and biographical networks
Liberating lives: Invisible Australians and biographical networksLiberating lives: Invisible Australians and biographical networks
Liberating lives: Invisible Australians and biographical networksTim Sherratt
 
Pope Joan Top Girls - Pupil Presentation on the character and links with Much...
Pope Joan Top Girls - Pupil Presentation on the character and links with Much...Pope Joan Top Girls - Pupil Presentation on the character and links with Much...
Pope Joan Top Girls - Pupil Presentation on the character and links with Much...Emma Sinclair
 
Panama Canal Course Day 1 final
Panama Canal Course Day 1 finalPanama Canal Course Day 1 final
Panama Canal Course Day 1 finalAdolf89
 
Alma.Daskalaki.Portfolio 2010
Alma.Daskalaki.Portfolio 2010Alma.Daskalaki.Portfolio 2010
Alma.Daskalaki.Portfolio 2010almataki
 
Henry II
Henry IIHenry II
Henry IIPato_Ch
 

En vedette (20)

NAIROBI- KENYA-September 21,2013
NAIROBI- KENYA-September 21,2013NAIROBI- KENYA-September 21,2013
NAIROBI- KENYA-September 21,2013
 
US in WWI
US in WWIUS in WWI
US in WWI
 
Thedoctorthedictator test
Thedoctorthedictator testThedoctorthedictator test
Thedoctorthedictator test
 
Theme 4 part 2
Theme 4 part 2Theme 4 part 2
Theme 4 part 2
 
Russian 9-11 Memorial
Russian 9-11 MemorialRussian 9-11 Memorial
Russian 9-11 Memorial
 
Roaring 20s full
Roaring 20s fullRoaring 20s full
Roaring 20s full
 
Group 2 Exam
Group 2  ExamGroup 2  Exam
Group 2 Exam
 
Chapter 5 power point
Chapter 5 power pointChapter 5 power point
Chapter 5 power point
 
10.3
10.310.3
10.3
 
USA- Boston Marathon bombing - April 15,2013
USA- Boston Marathon bombing - April 15,2013USA- Boston Marathon bombing - April 15,2013
USA- Boston Marathon bombing - April 15,2013
 
Lesson 4 data processing
Lesson 4   data processingLesson 4   data processing
Lesson 4 data processing
 
Computing Without Computers - Oct08
Computing Without Computers - Oct08Computing Without Computers - Oct08
Computing Without Computers - Oct08
 
History.text.pearson
History.text.pearsonHistory.text.pearson
History.text.pearson
 
TAKE THAT
TAKE THATTAKE THAT
TAKE THAT
 
The English in North America
The English in North AmericaThe English in North America
The English in North America
 
Liberating lives: Invisible Australians and biographical networks
Liberating lives: Invisible Australians and biographical networksLiberating lives: Invisible Australians and biographical networks
Liberating lives: Invisible Australians and biographical networks
 
Pope Joan Top Girls - Pupil Presentation on the character and links with Much...
Pope Joan Top Girls - Pupil Presentation on the character and links with Much...Pope Joan Top Girls - Pupil Presentation on the character and links with Much...
Pope Joan Top Girls - Pupil Presentation on the character and links with Much...
 
Panama Canal Course Day 1 final
Panama Canal Course Day 1 finalPanama Canal Course Day 1 final
Panama Canal Course Day 1 final
 
Alma.Daskalaki.Portfolio 2010
Alma.Daskalaki.Portfolio 2010Alma.Daskalaki.Portfolio 2010
Alma.Daskalaki.Portfolio 2010
 
Henry II
Henry IIHenry II
Henry II
 

Similaire à Trends in it

Communication systems 2010
Communication systems 2010Communication systems 2010
Communication systems 2010greg robertson
 
Unit 10 Assignment_2_Sig_Theory_and_Data Elements V3
Unit 10 Assignment_2_Sig_Theory_and_Data Elements V3Unit 10 Assignment_2_Sig_Theory_and_Data Elements V3
Unit 10 Assignment_2_Sig_Theory_and_Data Elements V3John Mathias
 
Communicationsystems2
Communicationsystems2Communicationsystems2
Communicationsystems2MR Z
 
Tools part 4
Tools part 4Tools part 4
Tools part 4MR Z
 
HSC Communication systems
HSC Communication systems HSC Communication systems
HSC Communication systems greg robertson
 
Elet 4315 homework 2
Elet 4315 homework 2Elet 4315 homework 2
Elet 4315 homework 2Rever Wesley
 
A Process Oriented Development Flow for Wireless System Networks by Bernard P...
A Process Oriented Development Flow for Wireless System Networks by Bernard P...A Process Oriented Development Flow for Wireless System Networks by Bernard P...
A Process Oriented Development Flow for Wireless System Networks by Bernard P...ESUG
 
Chapter 1 introduction haramaya
Chapter 1 introduction haramayaChapter 1 introduction haramaya
Chapter 1 introduction haramayaAbdii Rashid
 
18ECC303J-Unit1-Week1-AY2020-21.pptx
18ECC303J-Unit1-Week1-AY2020-21.pptx18ECC303J-Unit1-Week1-AY2020-21.pptx
18ECC303J-Unit1-Week1-AY2020-21.pptxelaelango
 
Transmitting And Receiving ( Sim And Han).Pptw.Quiz
Transmitting And Receiving ( Sim And Han).Pptw.QuizTransmitting And Receiving ( Sim And Han).Pptw.Quiz
Transmitting And Receiving ( Sim And Han).Pptw.Quizmfridolfson
 
Frame Relay And Leased Lines Essay
Frame Relay And Leased Lines EssayFrame Relay And Leased Lines Essay
Frame Relay And Leased Lines EssayRenee Jones
 
basic-celluar-systefhurdhguudhugudhguugudghum.ppt
basic-celluar-systefhurdhguudhugudhguugudghum.pptbasic-celluar-systefhurdhguudhugudhguugudghum.ppt
basic-celluar-systefhurdhguudhugudhguugudghum.pptmakeporium
 
Communication systems revision 2017
Communication systems revision 2017 Communication systems revision 2017
Communication systems revision 2017 greg robertson
 

Similaire à Trends in it (20)

Communication systems 2010
Communication systems 2010Communication systems 2010
Communication systems 2010
 
computer network basics
computer network basicscomputer network basics
computer network basics
 
Unit 10 Assignment_2_Sig_Theory_and_Data Elements V3
Unit 10 Assignment_2_Sig_Theory_and_Data Elements V3Unit 10 Assignment_2_Sig_Theory_and_Data Elements V3
Unit 10 Assignment_2_Sig_Theory_and_Data Elements V3
 
Communicationsystems2
Communicationsystems2Communicationsystems2
Communicationsystems2
 
Tools part 4
Tools part 4Tools part 4
Tools part 4
 
HSC Communication systems
HSC Communication systems HSC Communication systems
HSC Communication systems
 
OSI MODELS.pptx
OSI  MODELS.pptxOSI  MODELS.pptx
OSI MODELS.pptx
 
Elet 4315 homework 2
Elet 4315 homework 2Elet 4315 homework 2
Elet 4315 homework 2
 
4 5 marks importnt question dcn
4 5 marks importnt question dcn4 5 marks importnt question dcn
4 5 marks importnt question dcn
 
A Process Oriented Development Flow for Wireless System Networks by Bernard P...
A Process Oriented Development Flow for Wireless System Networks by Bernard P...A Process Oriented Development Flow for Wireless System Networks by Bernard P...
A Process Oriented Development Flow for Wireless System Networks by Bernard P...
 
CCN 1 Slide (1).pptx
CCN 1 Slide (1).pptxCCN 1 Slide (1).pptx
CCN 1 Slide (1).pptx
 
Chapter 1 introduction haramaya
Chapter 1 introduction haramayaChapter 1 introduction haramaya
Chapter 1 introduction haramaya
 
io intweface.pptx
io intweface.pptxio intweface.pptx
io intweface.pptx
 
18ECC303J-Unit1-Week1-AY2020-21.pptx
18ECC303J-Unit1-Week1-AY2020-21.pptx18ECC303J-Unit1-Week1-AY2020-21.pptx
18ECC303J-Unit1-Week1-AY2020-21.pptx
 
Transmitting And Receiving ( Sim And Han).Pptw.Quiz
Transmitting And Receiving ( Sim And Han).Pptw.QuizTransmitting And Receiving ( Sim And Han).Pptw.Quiz
Transmitting And Receiving ( Sim And Han).Pptw.Quiz
 
Frame Relay And Leased Lines Essay
Frame Relay And Leased Lines EssayFrame Relay And Leased Lines Essay
Frame Relay And Leased Lines Essay
 
Bt0072
Bt0072Bt0072
Bt0072
 
Basic celluar-system
Basic celluar-systemBasic celluar-system
Basic celluar-system
 
basic-celluar-systefhurdhguudhugudhguugudghum.ppt
basic-celluar-systefhurdhguudhugudhguugudghum.pptbasic-celluar-systefhurdhguudhugudhguugudghum.ppt
basic-celluar-systefhurdhguudhugudhguugudghum.ppt
 
Communication systems revision 2017
Communication systems revision 2017 Communication systems revision 2017
Communication systems revision 2017
 

Dernier

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

Dernier (20)

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

Trends in it

  • 1. Stages of Information System development 1) Requirement analysis : study the existing system & determine the requirements of User preparation of system study report. 2) Systems Design (Logical Design) : Conceptualization of the new system based on system study report prepared in step 1. It deals with algorithm, database design , specification of interfaces between all programs to make a system, hardware, Operating system, file system & programming languages.. 3) Development of prototype : With a concept, design a model 4) System Design (Physical Design) : Partitioning of the system in to programs, preparing a detail algorithm to the problem confronted with a detail database design, interfaces used, OS, H/w, S/w, file system and languages. 5) Preparation of test data – About each individual stages & programs as well as system linking testing.
  • 2. Approaches to algoithms Hardware - single / Multiple user environment. Data storage & retrieval – Magnetic tape, Hard disk, CD, DVD Input devices – Punched card reader, keyboard, digitizer, Mouse, Mike, Scanners. Output devices – Printers (laser, dot matrix, Ink jet), monitor. Operating system – default to the user environment (DOS, Windows, Unix, Xenix) Language – Basic, Fortran, C, C++, DHTML, ASP. Net, etc. Productivity tool – Program generators and application generator tools. Data Management - Conventional File system (Sequential) and Database Management System, RDBMS. hbs.ac.in
  • 3. Development of System Software S/w Development Trend Scheduled Operation Single Transaction Process Batch Sequential process On-demand operation Batch Indexed Sequential process Batch Random process Interactive Non-interactive Slow Response Fast Response Response in 24 hours Data read & updated interactively Data read & not updated interactively Response as soon as possible hbs.ac.in
  • 4. Expert systems (ES) It is a computer programs which make recommendations and draw conclusions from rules of thumb / heuristics and from the relationships derived out of human behaviour. It aids the manager in the process of decision-making by suggesting alternatives solutions in all desciplines. It provides expert advice by “domain specific knowledge”. Processing information requires knowledge , comprising judgement, experience, and reasoning of top management. A right decision can be made at the time – only when right information is available to the right man, in the right form, at the right time. The decision maker analyze, evaluate and reason with this knowledge along assistantship of specialized knowledge in an appropriate way. An effective decision has two components, Timeliness and Correctness i.e., quality and consistency in DM. hbs.ac.in
  • 5. Expert systems (ES) Outcomes Major activities like expansion, investment planning, raising fresh capital on a venture, make or buy analysis and dividend decisions by considering current economic conditions. Other decision like setting up or shutting down of a production unit/ line against the alternative of purchasing the item. ES will give you an estimation of various costs involved and its association with each alternatives. It also draws control, design, monitor, predict and train middle level management for performance enhancer. Establishing control systems, budgeting, cash flow analysis, framing customer credit policies, forecasting income, expenses growth rates, accounts payable & receivable. Diagnosis, interpretation & monitoring of all the activities at the lower levels and application is virtually endless. hbs.ac.in
  • 6. Expert systems Applications Establishing sales quotas. Conducting trainee orientation. Recommending acquisition strategies. General project proposals. Job shop scheduling. Facilities maintenance. Selection of forecasting models Determining credit limits, and Selecting transport routes. hbs.ac.in
  • 7. Basis of Data Communication (DC) By data communication we mean the transportation of information from one point to another through a communication media. It facilities efficient use of large computers, improves the day-to-day monitoring of projects and provides a variety of services like e-mail, credit card checking, etc are valued added services. The main components of DC are data source (originator), data sink (receiver), and communication media (telephone wire, co-axial cable, microwave, fibre-optic, satellite circuit). hbs.ac.in
  • 8. Types of Data Communication (DC) Electronic signals actually represents reality viz., pressure, temperature, stress that can be represented in equivalent electronic signals. Analog and Digital are the two types of e-signal. Analog signals are continuous in nature in a sinusoidal form, there is no break anywhere. E.g. speech in a microphone. Digital signals are discrete in nature i.e., present TRUE or not present FALSE. Computers uses only digital signals for data communication. MOdulator-DEModulator (MODEM) is a device that converts Analog to Digital and vice versa. hbs.ac.in
  • 9. Types of Transmission Transmission of data in either digital / analog form since signals may originate from several independent sources e.g. computers, FAX, Video conference, etc. (Baud, Bit, Byte, Nibble) Analog transmission is similar like transmission through telephone network, they travel a longer distance and has noise interferences (electrical parlance) in it, that can damage the content & integrity of data at large. Digital transmission is less error prone, high quality, digital fidelity, and can’t travel long distance hence converted to electrical analog signal before transmission. They are not simply amplified, they are absorbed & regenerated at regular intervals, thus noise are eliminated. hbs.ac.in
  • 10. Mode of Data Transmission Serial mode – a stream of data bit by bit over the communication line. Initially a sender transmits the first bit, after some time (machine cycle) the second bit is transmitted and so on. The receiver receives the data exactly in the same format sequence bit by bit. The objective is to transmit data from one point to another along a single line or channel. The channel has an ability to carry a signal at a time (LSB, MSB). Receiver consequently has an ability to recognize the serial stream of bits as character. There are two techniques for recognizing and separating characters from the serial bit stream. They are synchronous and asynchronous transmission. During transmission if any error occurred, that particular bit is only lost and it operates on cost effective hardware. Transmission of 8-bit ASCII data requires 8 cycles of operation. Serial data transmission is done in three ways, viz. synchronous, asynchronous and Iso-syndronous. hbs.ac.in
  • 11. Mode of Data Transmission Parallel mode – Here all the bits of information are transmitted in a single cycle. i) During transmission if any error occurred, whole set of data is lost and it operates on costly hardware. E.g. 8-bit ASCII code, all the 8 bits are transmitted over the communication media in a single cycle (i.e.,) eight-fold increase in the transmission speed. ii) Limitations are the sender and receiver have to agree on the exchange of one or more characters using appropriate protocol (communication control methodology) – defines the content and the sequence of exchange of units of information (bits, bytes, or groups of bytes called PACKETS) b/w any two systems. iii) At high speeds of transfer using parallel transmission, protocols will be in the form of hardware signal exchanges (complex and expensive). Always used b/w subsystems of a computer system. iv) They are confined to shorter distance transmission (few feet). hbs.ac.in
  • 12. Serial Mode of Data Transmission Asynchronous Transmission – It is most commonly used transmission mode, where each character data to be transmitted is preceded by a start bit and terminated by one or two stop bits. It is also called as START/STOP transmission with indefinite time lag for the next character. i) The start signal tells the receiver where the new character starts and the function of stop bit is to tell the receiver that the character has ended, so that the next start bit will be perceived as the start of a new character. The receiver can know the end of the character by counting the number of bits. e.g person keying from a keyboard and getting the response from monitor. ii) Always , the two devices (terminal & computer), have to agree upon the number of bits in a character and the bit time. iii) The speed ranges from 1200 bits per second to 9600 bits per second and applied b/w different devices of varying speed, e.g a Computer terminal with a dot matrix printer . iv) It is relatively simple to implement but its results are inefficient since it lack full utilization of channel capacity. hbs.ac.in
  • 13. Serial Mode of Data Transmission b) Synchronous Transmission – It is used to achieve high speed of data-transmission, where sender transmit a block of characters together in one single transmission. The transmission b/w them is achieved by transmission of a pre-determined group of bits known as synchronous bits. These synchronous bits inform the receiver that the data is following and he can determine the time frame b/w each of the bits. The receiver start receiving the bits and starts interpreting them bit by bit of 8 bits, into character from as per ASCII code and transmits to the computer. There are at least three SYN characters, followed by number of data characters and then finally the checksum character. This type of transmission are done b/w device of same speed of operation. E.g. mother board RAM with cache memory. Discuss the difference b/w SYN and ASYN mode. hbs.ac.in
  • 14. Serial Mode of Data Transmission c) ISO-Synchronous Transmission – It is a technique which makes use of both synchronous and asynchronous data transmission modes. i) Here each character starts with a start-bit and ends with a stop-bit. In addition, the time interval b/w transmission of two characters will be integer multiple of the length of the time required to transmit one character. (definite time lag). ii) A circuit is a path for transmission of electrical signals b/w two or more points. The termschannel, line, circuit, link or a path are synonymously used. iii) There are three types of transmission, viz. Simplex, half-duplex and full-duplex. Source Source Sink Sink Source Sink hbs.ac.in
  • 15. Data Communication Software They are written in Assembly level language (hexadecimal or octal) and burnt into the microprocessor’s memory (ROM, EPROM). Main functions of these software were : a) Transmission initiation and termination b) Establishment of logical connections over physical line c) Message assembly and deassembly d) data transmission and receipt e) code conversion f) error detection g) control character recognition. h) data editing i) data delivery j) data output k) transmission monitoring and maintenance l) Schedule and monitor all resources (H/w, S/W, data, etc). hbs.ac.in
  • 16. Data Communication Protocols Primary Functions are a) At the lowest level, h/w protocols, like ASYN transmission protocol that operate b/w two synchronized devices. b) To make sure that the bits are securely transmitted through the channel or line, we need a link protocol b/w two computers. Other functions are 1) Ensuring that the data to be transmitted is split into data blocks with beginning and ending markers, called FRAMING and transmission block is called FRAME 2) Achieving data transparency by allowing a link to treat a bit pattern, including normally restricted control characters. 3) Controlling the flow of data across the link at a faster rate and ensure overflow, underflow, ensuring buffering capacity used-up that leads to loss of data. 4) Controlling errors by detection using some redundancy check 5) BISYNC (Binary Synchrounousprocools) and HLDC (high level data link control protocol , TCP/IP) hbs.ac.in
  • 17. Seven layers of Open System International (OSI) Model Each of these layers performs certain specific functions 1) Physical layer - It is the lower layer that support wide variety of physical media for interconnection by using suitable control procedures. 2) Data link layer – It provides methods for error-free transmission over the physical layer and above s.no.1. 3) Network layer – It performs the delivery of data through certain protocols such as routing and provides a communication path b/w two end-points. 4) Transport layer – It forms the uppermost layer of data transport service. It isolates high level entities from any concern of transport of data from one system to another & make transparent n/w to the users. 5) Session layer – It performs the job of the controller and synchronizes the dialogue session between the systems. 6) Presentation layer – It provides a general service not unique to a specific application (AL) & concerns with representation and manipulation of data. 7) Application Layer – It makes use of the service provided by the lower layers by providing interface to the user processes. hbs.ac.in
  • 18. Data Transmission Error and Recovery Data while transmitted, may suffer some damage due to noise or distortion due to external disturbances or transmission medium itself. Please note 0 & 1 is send and received as 1 and 0, the given bit is either 0% error or 100% and nothing in between. Bit Error Rate (BRR) of the channel decides about the characters send per second is counted, where both serial and parallel mode (Block Error Rates) of transmission are tested. Since the channels are error prone, recovery mechanisms are a must. Even a single bit is lost, the whole character consisting of weight bits is lost. Protocol (set of rules governing info. flow in a communication system) decides who can talk and when, start-stop protocol helps in restricting loss to a character. Protocol has main purposes : To ensure that the information is transmitted when and only when the communication channel is free and the appropriate terminal devices are read to receive To prevent corruption or loss of information during transmission. The receiving terminal can then send a character to indicate wither that the block was error free or that an error occurred and a retransmission is required with an ACK signal and NAK signal. hbs.ac.in